World War II saw some impressive acts of deception, some to hide secrets, and some to mislead the other side. The Germans developed the Enigma machine, an early electronic encryption device. The Allies broke the Enigma code, and so learned a great deal about German military actions. And in an effort to mask the D-Day invasion, the Allies launched a project known as 'Fortitude.' Under Fortitude, the Allies created fake armies, composed largely of inflatable rubber tanks and other 'vehicles,' carefully placed to convince the Germans that the main Allied invasion would take place at Pas-de-Calais rather than Normandy. “Exposing your source code shouldn't be an issue, because your code should survive inspection” I do recall a long time ago the architects of a large military base making the same assumption, the sheer power and technological supremacy of the base would render any weakness inconsequential. Description: HPC CodeSource Online - 500 Code Searches Carry your entire code database in the palm of your hand with HPC's Code Source ® Online. One small price gives you access to all the codes you may need in a given year. Fortitude was a great success: it lured German forces away from the Normandy beaches, helping the Allies establish a presence on the European mainland. World War II saw some impressive acts of deception, some to hide secrets, and some to mislead the other side. The Germans developed the Enigma machine, an early electronic encryption device. The Allies broke the Enigma code, and so learned a great deal about German military actions. And in an effort to mask the D-Day invasion, the Allies launched a project known as “Fortitude.” Under Fortitude, the Allies created fake armies, composed largely of inflatable rubber tanks and other “vehicles,” carefully placed to convince the Germans that the main Allied invasion would take place at Pas-de-Calais rather than Normandy. Fortitude was a great success: it lured German forces away from the Normandy beaches, helping the Allies establish a presence on the European mainland. Today’s confrontation between computer crackers and system administrators bears some resemblance to the information and misinformation campaigns of World War II. The skirmishes between security measures and security exploits rage on. Most Linux system administrators know how to use encryption tools such as the Secure Shell ( ssh) to hide keystrokes and network traffic from crackers, and we all hope that these tools are substantially safer than Enigma. But a less well-known security tactic is the computer equivalent of Fortitude: the honeypot. A honeypot is a computer system that’s intentionally configured to appear (or to actually be) vulnerable to outside attack. Seemingly weak, the honeypot entices a would-be intruder to attack it. But the honeypot is not just a simple decoy — it’s closely monitored to detect attacks and analyze intrusion techniques. Given the nature of an attack and critical information such as the originating IP address, measures can be developed to improve security on other, real production systems, and perhaps to even pursue the cracker through the legal system. Before reading any further, you should realize that honeypots do not protect your systems in the way that a firewall protects your systems. Unlike World War II’s Fortitude, a honeypot isn’t likely to lure a cracker into expending so many resources on attacking the decoy that your other systems become safer. Rather, honeypots are information-gathering, forensic tools. To improve your network’s overall security, you must configure the honeypot properly, and then take the time to analyze data collected from attacks. In general, because honeypots require significant resources to configure and deploy, and require an ongoing commitment to proactive monitoring, honeypots are typically only deployed in larger enterprises. ![]() However, if you’re willing to make the investment, honeypots can fine-tune your defenses. The Benefits and Risks of Running a Honeypot A typical honeypot lures a cracker into attacking it. The honeypot or associated software can then track the cracker’s activity, frequently capturing incriminating information. The honeypot then fakes a network problem or system crash, and makes the system unavailable. Crack raster design 2008 wimbledon free. Typically, organizations with many systems or a strong interest in computer security run honeypots. Honeypots can help gather information about cracker exploits in general, and sometimes even collect information about individual crackers. For instance, a honeypot would (you hope) appear to be more vulnerable or more appealing to crackers than your legitimate systems.
0 Comments
Leave a Reply. |